SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
WiMAX (IEEE 802.16)
Presented
By:
Muhammad Israr Akbar
INU Peshawar
1
 Introduction
 Overview of the IEEE 802.16 Standard
 Application
 Physical layer
 MAC Layer
 WIMAX versus Wi-Fi
 Conclusion
2
 The acronym WiMAX stands for “Worldwide
Interoperability for Microwave Access”. It is
based on IEEE 802.16 standard.
 IEEE 802.16 is the IEEE standard for Wireless
Metropolitan Area Network (Wireless MAN).
 It specifies the air interface for fixed, portable,
and mobile broadband wireless access (BWA)
systems supporting multimedia services.
3
 WiMAX aims to provide wireless broadband
services with a target range of up to 31 miles at
a transmission rate exceeding 100 Mbps.
 It is also to provide a wireless alternative to
cable, DSL and T1/E1 for last mile access.
 The term IEEE 802.16 and WIMAX are used
interchangeably.
 WiMAX is to IEEE 802.16 what Wi-Fi is to IEEE
802.11
4
 Designed for point-to-point (PTP) and point-to-
multipoint (PTM) topologies but mainly deployed
for point to multipoint topologies. It also support
mesh topologies.
 In PTM a base station (BS) services many
subscriber stations (SS) which are mounted
outdoors.
 IEEE 802.16 has three major versions; 802.16-
2001, 802.16-2004 and IEEE 802.16-2005.
5
 Addresses fixed line of sight connections and
operates in the licensed frequency range
between 10 GHz and 66 GHz.
 At these high frequency range there are more
available bandwidth and reduced risk of
interference.
 Has a maximum coverage of 5km.
6
 Designed to operate in lower frequency range;
2-11 GHz.
 Support Non-line of sight (NLOS) operation.
 Operates in both licensed (3.5 GHz) and
unlicensed (5.8 GHz).
 Operates with a range of up to 50km and data
rates of up to 75Mbps.
 It is the most supported version of the standard
by vendors.
7
 Support mobility and will standardize networking
between fixed base stations and mobile devices.
 Would enable high-speed signal handoffs
necessary for communications with users
moving at vehicular speeds which is below
100km/h.
 It will provide a symmetric (up and down) bit
rates of 70Mbps.
 operate in the frequency range between 2-6
GHz.
8
 To provide a wireless alternative to cable, DSL and
T1/E1 for last mile access especially in areas where wire
broadband access are absent.
 Serves as E1/T1 replacements for small and medium
size businesses.
 Provide residential ‘wireless DSL’ for broadband Internet
at home.
 It can be used as wireless backhaul for Wi-Fi hotspot
and cellular companies.
 Operators/carriers can use it as a backup backbone.
 It can be used in disaster recovery scenes where the
wired networks have broken down.
9
10
Figure 1: WiMAX Applications
IEEE 802.16-2001
 Designed for line-of-sight propagation because the
frequency range is between 10-66 GHz.
 single-carrier modulation is used and the air interface is
called “WirelessMAN-SC”.
 In PTM architecture, the BS transmits a TDM signal, with
individual subscriber stations allocated time slots
serially. While access in the uplink direction is by Time-
division Multiple Access (TDMA).
 uses both time division duplexing (TDD) and frequency-
division duplexing (FDD).
11
IEEE 802.16-2004 (802.16d)
 Design for the 2-11 GHz range and is more
complex because of interference.
 Three air interfaces are specified for this range,
which are;
◦ Wireless MAN-SC uses single carrier modulation
◦ Wireless MAN-OFDM(Orthogonal frequency-division multiplexing (OFDM )
uses a 256-carrier FDM. Provides multiple access to
different stations through TDMA. (Most adopted by
vendors)
◦ Wireless MAN-OFDMA uses a 2,048-carrier OFDM
scheme. Provides multiple access by assigning a
subset of the carriers to an individual receiver
12
13
Table 1: Physical Layer Features [5]
IEEE 802.16-2005 (802.16e)
 The main technologies used for it’s physical layer are
OFDMA and an improved version called Scalable
OFDMA (SOFDMA).
 OFDMA is required in the implementation of 802.16e
and also for the certification of 802.16e devices.
 SOFDMA scales the number of sub-carriers in a channel
with possible values of 128, 512, 1024, and 2,048.
 OFDMA and SOFDMA also benefit fixed broadband
service because carriers can allocate spectrum more
efficiently and reduce interference.
14
 It is connection oriented and supports quality of service.
 It uses a slotted TDMA protocol scheduled by the base
terminal station to allocate capacity to subscribers.
 Supports both Time Division Duplex (TDD) and
Frequency Division Duplex (FDD) and, also Half Duplex-
FDD.
 supports quality of service (QoS) for stations through
adaptive allocation of the uplink and downlink traffic.
 It also supports different transport technologies such as
IPv4, IPv6, Ethernet, Asynchronous Transfer Mode
(ATM) and any future protocol not yet developed.
15
16
Table 2: MAC Layer Features [5]
 WiMAX was designed to replace the last-mile wired-broadband
access networks while Wi-Fi was created for providing services
into LAN networks.
 At the PHY layer, WiMAX channel sizes ranges from 1.75 MHz to
20 MHz while Wi-Fi based products require at least 20 MHz for
each channel.
 Wi-Fi uses the CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance) which is not an efficient protocol. The MAC
layer in WiMAX has been designed to scale from one to up 100s
users within one RF channel.
 In WiMAX, the base station assigns a QoS class to each
connection. In 802.11, QoS was not considered in the early stage
of its implementation.
 WiMAX supports many transport technologies, such as ATM, IPv4,
and IPv6 which are not supported by Wi-Fi.
 WiMAX has the ability to support longer range transmission from 2
to 40 kilometers. While 802.11 was designed for low power
consumption which limit the coverage to hundreds of meters.
17
 WiMAX will no doubt be a viable alternative to DSL and cable
connections.
 It has changed the scene of wireless broadband by standardizing
an industry which provides proprietary solutions.
 There have been more than 150 commercial trials and WiMAX
network deployments that have taken place worldwide.
 In January 2006, Samsung revealed its WiMAX enabled M8000
handset, which connects directly to WiMAX base stations through
802.16e. [2]
 Most of the frequency range where WiMAX can operate is really
congested and most have been allocated to carriers and other
users.
 WiMAX mobile version, may face serious competition from IEEE
802.20 mobile broadband technology and 3G cellular systems.
 It will have stiff competition with already establish broadband access
technology such as DSL and cable modem.
 The Mobile version (802.16e) is not compatible with the fixed version
(802.16d) which has slow down the release of WiMAX equipment into the
market by vendors.
 WiMAX is the future of wireless broadband access technology.
18
19
20

Mais conteúdo relacionado

Mais procurados

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Combating fading channels (1) (3)
Combating fading channels (1) (3)Combating fading channels (1) (3)
Combating fading channels (1) (3)liril sharma
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 

Mais procurados (20)

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Combating fading channels (1) (3)
Combating fading channels (1) (3)Combating fading channels (1) (3)
Combating fading channels (1) (3)
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 

Destaque (18)

Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional waves
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"
 
WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecture
 
Wimax
WimaxWimax
Wimax
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
 
Wimax
WimaxWimax
Wimax
 
Wimax
WimaxWimax
Wimax
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 
Introduction to WiMAX
Introduction to WiMAXIntroduction to WiMAX
Introduction to WiMAX
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
What Is WiMax
What Is WiMaxWhat Is WiMax
What Is WiMax
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
WiMAX Basics
WiMAX Basics WiMAX Basics
WiMAX Basics
 
WiMAX
WiMAXWiMAX
WiMAX
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 

Semelhante a WiMAX (IEEE 802.16)

Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimaxRubab Fatima
 
Wi max fixed vs. mobile
Wi max fixed vs. mobileWi max fixed vs. mobile
Wi max fixed vs. mobileMustafa Saad
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXcscpconf
 
Wimax CHALLENGES IN INDIA AND ABROAD
Wimax CHALLENGES IN INDIA AND ABROADWimax CHALLENGES IN INDIA AND ABROAD
Wimax CHALLENGES IN INDIA AND ABROADMANIK GUPTA
 
WiMax and non standard solutions
WiMax and non standard solutionsWiMax and non standard solutions
WiMax and non standard solutionsMario B.
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16coolbp
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: cscpconf
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerIOSR Journals
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi MaxSiyad Ca
 

Semelhante a WiMAX (IEEE 802.16) (20)

IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Wi max vs wifi
Wi max vs wifiWi max vs wifi
Wi max vs wifi
 
Wi max fixed vs. mobile
Wi max fixed vs. mobileWi max fixed vs. mobile
Wi max fixed vs. mobile
 
Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
 
Wi max
Wi maxWi max
Wi max
 
012327336 aq
012327336 aq012327336 aq
012327336 aq
 
Wi max
Wi  maxWi  max
Wi max
 
Wimax CHALLENGES IN INDIA AND ABROAD
Wimax CHALLENGES IN INDIA AND ABROADWimax CHALLENGES IN INDIA AND ABROAD
Wimax CHALLENGES IN INDIA AND ABROAD
 
WiMax and non standard solutions
WiMax and non standard solutionsWiMax and non standard solutions
WiMax and non standard solutions
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16
 
Fg24980983
Fg24980983Fg24980983
Fg24980983
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
 
Wimax 2
Wimax 2Wimax 2
Wimax 2
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 

Mais de Sajid Marwat

Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overviewSajid Marwat
 
Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseSajid Marwat
 
Automata definitions
Automata definitionsAutomata definitions
Automata definitionsSajid Marwat
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular conceptSajid Marwat
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview, Sajid Marwat
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structureSajid Marwat
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance Sajid Marwat
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec IISajid Marwat
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec ISajid Marwat
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihmSajid Marwat
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G TechnologiesSajid Marwat
 
Radio over Fiber Technology for WiMAX Systems
 Radio over Fiber Technology for WiMAX Systems Radio over Fiber Technology for WiMAX Systems
Radio over Fiber Technology for WiMAX Systems Sajid Marwat
 
Knowledge Representation & Reasoning
Knowledge Representation & ReasoningKnowledge Representation & Reasoning
Knowledge Representation & ReasoningSajid Marwat
 
top level view of computer function and interconnection
top level view of computer function and interconnectiontop level view of computer function and interconnection
top level view of computer function and interconnectionSajid Marwat
 

Mais de Sajid Marwat (15)

Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing Base
 
Manet
ManetManet
Manet
 
Automata definitions
Automata definitionsAutomata definitions
Automata definitions
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular concept
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview,
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structure
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec II
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec I
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G Technologies
 
Radio over Fiber Technology for WiMAX Systems
 Radio over Fiber Technology for WiMAX Systems Radio over Fiber Technology for WiMAX Systems
Radio over Fiber Technology for WiMAX Systems
 
Knowledge Representation & Reasoning
Knowledge Representation & ReasoningKnowledge Representation & Reasoning
Knowledge Representation & Reasoning
 
top level view of computer function and interconnection
top level view of computer function and interconnectiontop level view of computer function and interconnection
top level view of computer function and interconnection
 

Último

A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxjayshuklatrainer
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxnaveenithkrishnan
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusSkylark Nobin
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 

Último (15)

A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptx
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus Bonus
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 

WiMAX (IEEE 802.16)

  • 1. WiMAX (IEEE 802.16) Presented By: Muhammad Israr Akbar INU Peshawar 1
  • 2.  Introduction  Overview of the IEEE 802.16 Standard  Application  Physical layer  MAC Layer  WIMAX versus Wi-Fi  Conclusion 2
  • 3.  The acronym WiMAX stands for “Worldwide Interoperability for Microwave Access”. It is based on IEEE 802.16 standard.  IEEE 802.16 is the IEEE standard for Wireless Metropolitan Area Network (Wireless MAN).  It specifies the air interface for fixed, portable, and mobile broadband wireless access (BWA) systems supporting multimedia services. 3
  • 4.  WiMAX aims to provide wireless broadband services with a target range of up to 31 miles at a transmission rate exceeding 100 Mbps.  It is also to provide a wireless alternative to cable, DSL and T1/E1 for last mile access.  The term IEEE 802.16 and WIMAX are used interchangeably.  WiMAX is to IEEE 802.16 what Wi-Fi is to IEEE 802.11 4
  • 5.  Designed for point-to-point (PTP) and point-to- multipoint (PTM) topologies but mainly deployed for point to multipoint topologies. It also support mesh topologies.  In PTM a base station (BS) services many subscriber stations (SS) which are mounted outdoors.  IEEE 802.16 has three major versions; 802.16- 2001, 802.16-2004 and IEEE 802.16-2005. 5
  • 6.  Addresses fixed line of sight connections and operates in the licensed frequency range between 10 GHz and 66 GHz.  At these high frequency range there are more available bandwidth and reduced risk of interference.  Has a maximum coverage of 5km. 6
  • 7.  Designed to operate in lower frequency range; 2-11 GHz.  Support Non-line of sight (NLOS) operation.  Operates in both licensed (3.5 GHz) and unlicensed (5.8 GHz).  Operates with a range of up to 50km and data rates of up to 75Mbps.  It is the most supported version of the standard by vendors. 7
  • 8.  Support mobility and will standardize networking between fixed base stations and mobile devices.  Would enable high-speed signal handoffs necessary for communications with users moving at vehicular speeds which is below 100km/h.  It will provide a symmetric (up and down) bit rates of 70Mbps.  operate in the frequency range between 2-6 GHz. 8
  • 9.  To provide a wireless alternative to cable, DSL and T1/E1 for last mile access especially in areas where wire broadband access are absent.  Serves as E1/T1 replacements for small and medium size businesses.  Provide residential ‘wireless DSL’ for broadband Internet at home.  It can be used as wireless backhaul for Wi-Fi hotspot and cellular companies.  Operators/carriers can use it as a backup backbone.  It can be used in disaster recovery scenes where the wired networks have broken down. 9
  • 10. 10 Figure 1: WiMAX Applications
  • 11. IEEE 802.16-2001  Designed for line-of-sight propagation because the frequency range is between 10-66 GHz.  single-carrier modulation is used and the air interface is called “WirelessMAN-SC”.  In PTM architecture, the BS transmits a TDM signal, with individual subscriber stations allocated time slots serially. While access in the uplink direction is by Time- division Multiple Access (TDMA).  uses both time division duplexing (TDD) and frequency- division duplexing (FDD). 11
  • 12. IEEE 802.16-2004 (802.16d)  Design for the 2-11 GHz range and is more complex because of interference.  Three air interfaces are specified for this range, which are; ◦ Wireless MAN-SC uses single carrier modulation ◦ Wireless MAN-OFDM(Orthogonal frequency-division multiplexing (OFDM ) uses a 256-carrier FDM. Provides multiple access to different stations through TDMA. (Most adopted by vendors) ◦ Wireless MAN-OFDMA uses a 2,048-carrier OFDM scheme. Provides multiple access by assigning a subset of the carriers to an individual receiver 12
  • 13. 13 Table 1: Physical Layer Features [5]
  • 14. IEEE 802.16-2005 (802.16e)  The main technologies used for it’s physical layer are OFDMA and an improved version called Scalable OFDMA (SOFDMA).  OFDMA is required in the implementation of 802.16e and also for the certification of 802.16e devices.  SOFDMA scales the number of sub-carriers in a channel with possible values of 128, 512, 1024, and 2,048.  OFDMA and SOFDMA also benefit fixed broadband service because carriers can allocate spectrum more efficiently and reduce interference. 14
  • 15.  It is connection oriented and supports quality of service.  It uses a slotted TDMA protocol scheduled by the base terminal station to allocate capacity to subscribers.  Supports both Time Division Duplex (TDD) and Frequency Division Duplex (FDD) and, also Half Duplex- FDD.  supports quality of service (QoS) for stations through adaptive allocation of the uplink and downlink traffic.  It also supports different transport technologies such as IPv4, IPv6, Ethernet, Asynchronous Transfer Mode (ATM) and any future protocol not yet developed. 15
  • 16. 16 Table 2: MAC Layer Features [5]
  • 17.  WiMAX was designed to replace the last-mile wired-broadband access networks while Wi-Fi was created for providing services into LAN networks.  At the PHY layer, WiMAX channel sizes ranges from 1.75 MHz to 20 MHz while Wi-Fi based products require at least 20 MHz for each channel.  Wi-Fi uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) which is not an efficient protocol. The MAC layer in WiMAX has been designed to scale from one to up 100s users within one RF channel.  In WiMAX, the base station assigns a QoS class to each connection. In 802.11, QoS was not considered in the early stage of its implementation.  WiMAX supports many transport technologies, such as ATM, IPv4, and IPv6 which are not supported by Wi-Fi.  WiMAX has the ability to support longer range transmission from 2 to 40 kilometers. While 802.11 was designed for low power consumption which limit the coverage to hundreds of meters. 17
  • 18.  WiMAX will no doubt be a viable alternative to DSL and cable connections.  It has changed the scene of wireless broadband by standardizing an industry which provides proprietary solutions.  There have been more than 150 commercial trials and WiMAX network deployments that have taken place worldwide.  In January 2006, Samsung revealed its WiMAX enabled M8000 handset, which connects directly to WiMAX base stations through 802.16e. [2]  Most of the frequency range where WiMAX can operate is really congested and most have been allocated to carriers and other users.  WiMAX mobile version, may face serious competition from IEEE 802.20 mobile broadband technology and 3G cellular systems.  It will have stiff competition with already establish broadband access technology such as DSL and cable modem.  The Mobile version (802.16e) is not compatible with the fixed version (802.16d) which has slow down the release of WiMAX equipment into the market by vendors.  WiMAX is the future of wireless broadband access technology. 18
  • 19. 19
  • 20. 20